Commit graph

196559 commits

Author SHA1 Message Date
reed
5c8e8288af new package: menu-cache
The libmenu-cache library and its corresponding menu-cached daemon
are for creating and utilizing caches to speed up the manipulation
for freedesktop.org defined application menus.  It can be used as
a replacement of libgnome-menu of gnome-menus.
2013-01-31 03:25:53 +00:00
riastradh
bc17e03333 Update Tor's install message to reflect current recommendations.
The Tor Project ceased to recommend privoxy years ago; the only way
they recommend browsing the web is through the Tor Browser Bundle,
which Someone^TM ought to find some way to package up.
2013-01-30 22:09:22 +00:00
wiz
ae6e0cb672 Updated www/tidy to 20091027nb4 2013-01-30 21:00:10 +00:00
wiz
6fe7c6c923 New doxygen, new PLIST. Bump dependency and PKGREVISION. 2013-01-30 21:00:01 +00:00
wiz
f0fe24bc7a Sort. Add latest package. 2013-01-30 18:52:13 +00:00
wiz
94fc5d85a7 Added www/p5-CGI-Session-Plugin-Redirect version 1.01 2013-01-30 18:51:51 +00:00
wiz
1483b7bf34 Import p5-CGI-Session-Plugin-Redirect-1.01 as www/p5-CGI-Session-Plugin-Redirect.
Add a redirect method for CGI::Session.
2013-01-30 18:51:40 +00:00
adam
bd8baf0776 Updated devel/scmgit to 1.8.1.2 2013-01-30 17:40:46 +00:00
adam
93510c312d Changes 1.8.1.2:
* An element on GIT_CEILING_DIRECTORIES list that does not name the
  real path to a directory (i.e. a symbolic link) could have caused
  the GIT_DIR discovery logic to escape the ceiling.
* Command line completion for "tcsh" emitted an unwanted space
  after completing a single directory name.
* Command line completion leaked an unnecessary error message while
  looking for possible matches with paths in <tree-ish>.
* "git archive" did not record uncompressed size in the header when
  streaming a zip archive, which confused some implementations of unzip.
* When users spelled "cc:" in lowercase in the fake "header" in the
  trailer part, "git send-email" failed to pick up the addresses from
  there. As e-mail headers field names are case insensitive, this
  script should follow suit and treat "cc:" and "Cc:" the same way.
2013-01-30 17:39:39 +00:00
drochner
6901cf42ae add patch from upstream to fix Buffer Overflow in ASF Demuxer
bump PKGREV
2013-01-30 15:52:18 +00:00
schmonz
305ccde782 Fix fetch: MASTER_SITES is just ${HOMEPAGE} (no :Q). 2013-01-30 14:45:40 +00:00
wiz
35f582a064 Updated devel/scmgit to 1.8.1.1nb1 2013-01-30 14:45:09 +00:00
wiz
66e97ff682 Add scmgit-gitk to meta package.
Bump PKGREVISION.
2013-01-30 14:45:00 +00:00
wiz
da01f7cc33 Mention cvsps3. 2013-01-30 13:39:37 +00:00
wiz
a43e24ce88 + csvps3. 2013-01-30 13:38:53 +00:00
obache
9a71186a53 + di 2013-01-30 12:30:14 +00:00
obache
3e6bed525f Added sysutils/di version 4.34 2013-01-30 12:29:33 +00:00
obache
d1a0b9aaf1 Import di-4.34 as sysutils/di.
based on PR 47495 by Brad Lanam, some small fixes by me.

di is a disk information utility, displaying everything (and more)
that your df command does. It features the ability to display your
disk usage in whatever format you prefer. It also checks the user
and group quotas, so that the user sees the space available for
their use, not the system wide disk space.
2013-01-30 12:29:06 +00:00
taca
12ad1ee6a9 - samba-3.6.11.
+ samba-4.0.2, sudo-1.8.6p5, typo3-6.0.1.
2013-01-30 11:44:35 +00:00
taca
cd2a0ee912 Note update of smaba packages.
net/samba35	3.5.21
	net/samba	3.6.12
2013-01-30 11:43:53 +00:00
taca
4cd9d72c39 Update samba to 3.6.12.
==============================
                   Release Notes for Samba 3.6.12
                          January 30, 2013
                   ==============================


This is a security release in order to address
CVE-2013-0213 (Clickjacking issue in SWAT) and
CVE-2013-0214 (Potential XSRF in SWAT).

o  CVE-2013-0213:
   All current released versions of Samba are vulnerable to clickjacking in the
   Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
   a malicious web page via a frame or iframe and then overlaid by other content,
   an attacker could trick an administrator to potentially change Samba settings.

   In order to be vulnerable, SWAT must have been installed and enabled
   either as a standalone server launched from inetd or xinetd, or as a
   CGI plugin to Apache. If SWAT has not been installed or enabled (which
   is the default install state for Samba) this advisory can be ignored.

o  CVE-2013-0214:
   All current released versions of Samba are vulnerable to a cross-site
   request forgery in the Samba Web Administration Tool (SWAT). By guessing a
   user's password and then tricking a user who is authenticated with SWAT into
   clicking a manipulated URL on a different web page, it is possible to manipulate
   SWAT.

   In order to be vulnerable, the attacker needs to know the victim's password.
   Additionally SWAT must have been installed and enabled either as a standalone
   server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
   not been installed or enabled (which is the default install state for Samba)
   this advisory can be ignored.


Changes since 3.6.11:
--------------------

o   Kai Blin <kai@samba.org>
    * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
    * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
2013-01-30 11:42:54 +00:00
taca
38d0424828 Update samba35 to 3.5.21.
==============================
                   Release Notes for Samba 3.5.21
			 January 30, 2013
                   ==============================


This is a security release in order to address
CVE-2013-0213 (Clickjacking issue in SWAT) and
CVE-2013-0214 (Potential XSRF in SWAT).

o  CVE-2013-0213:
   All current released versions of Samba are vulnerable to clickjacking in the
   Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
   a malicious web page via a frame or iframe and then overlaid by other content,
   an attacker could trick an administrator to potentially change Samba settings.

   In order to be vulnerable, SWAT must have been installed and enabled
   either as a standalone server launched from inetd or xinetd, or as a
   CGI plugin to Apache. If SWAT has not been installed or enabled (which
   is the default install state for Samba) this advisory can be ignored.

o  CVE-2013-0214:
   All current released versions of Samba are vulnerable to a cross-site
   request forgery in the Samba Web Administration Tool (SWAT). By guessing a
   user's password and then tricking a user who is authenticated with SWAT into
   clicking a manipulated URL on a different web page, it is possible to manipulate
   SWAT.

   In order to be vulnerable, the attacker needs to know the victim's password.
   Additionally SWAT must have been installed and enabled either as a standalone
   server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
   not been installed or enabled (which is the default install state for Samba)
   this advisory can be ignored.


Changes since 3.5.20:
---------------------

o   Kai Blin <kai@samba.org>
    * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
    * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
2013-01-30 11:41:44 +00:00
ryoon
9aa36c986c Set MAINTAINER as me. 2013-01-30 11:37:41 +00:00
ryoon
cc91218abe Fix PR pkg/47363.
Import 3.2 version of cvsps as devel/cvsps3.

From README,
The 3.x versions have changed significantly.  In 2012, CVS use is declining
swiftly (GNU CVS hasn't been updated since 2004) and the original use case
for this tool - browsing change sets in a live CVS repository - is obsolete.
The 3.x versions are more focused on the --fast-export mode.
2013-01-30 11:34:58 +00:00
wiz
06391e608e + glpk-4.48, libproxy-1.4.11, phpmyadmin-3.5.6, py-sip-4.14.3,
qemu-1.3.1, wireshark-1.8.5.
2013-01-30 10:49:57 +00:00
wiz
739b1ffed4 Updated devel/doxygen to 1.8.3.1 2013-01-30 10:41:54 +00:00
wiz
3841907d26 Update to 1.8.3.1:
Changes

    Changed to way the search results for multiple projects can be
    linked together. A project is now no longer identified by the
    tag files name but via new option EXTERNAL_SEARCH_ID giving a
    bit more flexibility.
    Disabled the disk cache for member data. Allows removing quite
    some complexity in doxygen and is not really needed now that
    64bit systems with >4GB RAM are becoming more common. Let me
    know if you think you benefit from this caching.
    id 691607: Using $relpath$ in a custom footer could lead to
    ambiguities when followed by a name that could also be a marker,
    like 'search'. Now $relpath^ should be used instead. $relpath$
    is still supported for backward compatibility.

New features

    You can now use EXTENSION_MAPPING on files without any extension
    using no_extension as placeholder (thanks to Jason Majors for
    the patch).
    To make navindex section inside a layout file that links to a
    specific URL you can use usergroup with the url attribute.
    To make navindex section without any link inside a layout file
    you can use usergroup with special title [none].

And lots of bugfixes.
2013-01-30 10:41:43 +00:00
wiz
48d77ac942 Updated x11/pixman to 0.28.2 2013-01-30 10:21:30 +00:00
wiz
dfc23ac383 Update to 0.28.2:
0.28.2:

This stable release in the 0.28 series contains fixes for 64 bit
Windows, clang, and PowerPC on MacOS and OpenBSD.

0.28.0:
A new major release 0.28.0 of the pixman rendering library is now
available. Highlights of this release:

  * Support for sRGB coded images [Antti Lankila]

  * New API for fast glyph rendering [Soren Sandmann]

  * Faster bilinear scaling on iwMMX, Loongson and MMX [Matt Turner]

  * More fast paths in the MIPS DSPr2 backend [Nemanja Lukic]

  * Faster scaling in general and on SSE2 in particular [Siarhei
    Siamashka]
2013-01-30 10:21:22 +00:00
wiz
90d6df5648 Updated x11/xkeyboard-config to 2.8 2013-01-30 09:18:15 +00:00
wiz
20a2551f4b Update to 2.8:
Khaled Hosny (1):
      Allow Alt R to be used for next group again

Mathieu Boespflug (1):
      Add altwin:swap_alt_win option.

Michal Nazarewicz (1):
      Remove redundant definition in pl(dvp).

Parag Nemade (3):
      Correct the eurosign group to currencysign group
      Align keymappings in Jhelum keymap with m17n pa-jhelum keymap
      Add Rupee Sign default on some Indic xkb maps

Peter Hutterer (1):
      =?UTF-8?q?rules:=20remove=20ml=20=E2=86=92=20in(mal)=20ma?=
=?UTF-8?q?pping?=

Sergey V. Udaltsov (22):
      Added euro to Polish layout
      Added Silesian
      configuration for IBM 142 Italian variant
      il(lyx) should have proper mapping of numeric keys
      Added us(workman)
      More polish on us(workman)
      Cleanup for descriptions
      added de(legacy)
      A couple of missing chars in gr(polytonic), added on levels 3, 4
      fixed comment
      Fixed Congolese layout, 2 missing symbols
      Removed invalid layout
      Updated typography symbols
      Using configure.ac
      Added pl(colemak)
      Bumping version before freese - 2.7.99
      Forgot to remove the actual ad layout
      Fixed 2 minor typos (thanks to Alex Shopov)
      Missing hyphen
      SunOpen -> XF86Open
      Updated translations before release                                                                                                                                            Preparing 2.8

Stephan Hilb (1):
      Always use fake keycode bindings for level3 and level5

javier (8):
      Update keycodes and geometry for Sun Keyboards
      Update XKB symbols specific for Sun Keyboards
      Fix compat for Japanese Sun keyboards
      Update XKB rules specific for Sun Keyboards
      Remove tuv layout for Sun Keyboards
      Add Models and one option for Sun Keyboards
      Add Sun keyboard layout variants
      Add sun_type layout variants into base.extras
2013-01-30 09:18:07 +00:00
wiz
871e9357b6 Updated x11/xev to 1.2.1 2013-01-29 22:05:31 +00:00
wiz
54547c9a6e Update to 1.2.1:
This release adds a "-event" option that can be used to filter which events are
printed.  For example, to listen only for RandR events, use "xev -event randr".
The -event parameter can be specified multiple times.  Please see the manual
page for the list of available event filters.

This release also contains a few code fixes.

Aaron Plattner (2):
      Add a -event parameter to control the event mask
      xev 1.2.1

Alan Coopersmith (2):
      Fix clang warnings about converting size_t to int and back again
      Use strncasecmp instead of a tolower loop & strncmp
2013-01-29 22:05:23 +00:00
is
04faaf1242 Fix the VARBASE propagation to all utilities. Without this, we tried
to log to /spool/fax/Faxlog.
2013-01-29 16:56:39 +00:00
drochner
d429d67777 libupnp update 2013-01-29 16:23:39 +00:00
drochner
bbc3640c5b update to 1.6.18
changes:
-fix multiple buffer overflows (CVE-2012-5958..65)
-more bugfixes, Compilation optimisation
2013-01-29 16:22:47 +00:00
taca
1af542ed01 Note update of mail/fml package to 20121230. 2013-01-29 15:51:42 +00:00
taca
11c6cff0fa Update fml to 7.98.18-20121230.
7.98.18 hack base to catch up perl 5.16 changes, cpan modules ..
	7.98.17 update modules: cpan modules, IM et.al (to be planned).
	7.98.16 FML::Install is enhanced.
2013-01-29 15:51:06 +00:00
taca
80e846200e Note update of mail/fml4 package to 4.0.3.20040215nb4. 2013-01-29 15:49:22 +00:00
taca
86c02b0393 Allow '+' character in local-part.
Bump PKGREVISION.
2013-01-29 15:48:55 +00:00
taca
38dacd0c30 Note update of Ruby on Rails 3.0.20.
devel/ruby-activesupport3	3.0.20
	devel/ruby-activemodel		3.0.20
	www/ruby-activeresource3	3.0.20
	databases/ruby-activerecord3	3.0.20
	www/ruby-actionpack3		3.0.20
	mail/ruby-actionmailer3		3.0.20
	devel/ruby-railties		3.0.20
	www/ruby-rails3			3.0.20
2013-01-29 15:45:47 +00:00
taca
b53e6595f5 Update ruby-rails3 to 3.0.20.
No change except version.
2013-01-29 15:42:58 +00:00
taca
4663faf2d6 Update ruby-railties to 3.0.20.
No change except version.
2013-01-29 15:42:26 +00:00
taca
e09751688c Update ruby-actionmailer3 to 3.0.20.
No change except version.
2013-01-29 15:41:49 +00:00
taca
e0e749d733 Update ruby-actionpack3 to 3.0.20.
No change except version.
2013-01-29 15:41:17 +00:00
taca
c94c9fb86e Update ruby-activerecord3 to 3.0.20.
No change except version.
2013-01-29 15:40:43 +00:00
taca
da16f7d247 Update ruby-activeresource3 to 3.0.20.
No change except version.
2013-01-29 15:39:33 +00:00
taca
90fc96ee87 Update ruby-activemodel to 3.0.20.
Fix CVE-2013-0333.

There is a vulnerability in the JSON  code for Ruby on Rails which
allows attackers to bypass authentication systems, inject arbitrary
SQL, inject and execute arbitrary code, or perform a DoS attack on a
Rails application.

## Rails 3.0.20 (unreleased)

* Fix XML serialization of methods that return nil to not be
  considered as YAML (GH #8853 and GH #492)
2013-01-29 15:38:40 +00:00
taca
5f48765ae7 Update ruby-activesupport3 to 3.0.20.
Fix CVE-2013-0333.

There is a vulnerability in the JSON  code for Ruby on Rails which
allows attackers to bypass authentication systems, inject arbitrary
SQL, inject and execute arbitrary code, or perform a DoS attack on a
Rails application.

## Rails 3.0.20 (unreleased)

* Fix XML serialization of methods that return nil to not be
  considered as YAML (GH #8853 and GH #492)
2013-01-29 15:37:52 +00:00
taca
c55cad5b60 Start update of Ruby on Rails 3.0.20. 2013-01-29 15:36:12 +00:00